Kohls et al., 2022 - Google Patents
{VerLoc}: Verifiable Localization in Decentralized SystemsKohls et al., 2022
View PDF- Document ID
- 10083272685449977275
- Author
- Kohls K
- Diaz C
- Publication year
- Publication venue
- 31st USENIX Security Symposium (USENIX Security 22)
External Links
Snippet
We tackle the challenge of reliably determining the geolocation of nodes in decentralized networks, considering adversarial settings and without depending on any trusted landmarks. In particular, we consider active adversaries that control a subset of nodes, announce false …
- 230000004807 localization 0 title description 47
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kohls et al. | {VerLoc}: Verifiable Localization in Decentralized Systems | |
Poongodi et al. | Intrusion prevention system for DDoS attack on VANET with reCAPTCHA controller using information based metrics | |
Sheikh et al. | A comprehensive survey on VANET security services in traffic management system | |
Gondree et al. | Geolocation of data in the cloud | |
Hopper et al. | How much anonymity does network latency leak? | |
Wang et al. | Defending against sybil devices in crowdsourced mapping services | |
Pang et al. | Wifi-reports: Improving wireless network selection with collaboration | |
Wang et al. | Ghost riders: Sybil attacks on crowdsourced mobile mapping services | |
Fiore et al. | Discovery and verification of neighbor positions in mobile ad hoc networks | |
Gill et al. | Dude, Where's That {IP}? Circumventing Measurement-based {IP} Geolocation | |
de Melo et al. | UAVouch: a secure identity and location validation scheme for UAV-networks | |
US20120222089A1 (en) | Network topology aided by smart agent download | |
Abdou et al. | CPV: Delay-based location verification for the Internet | |
Kohls et al. | On the Challenges of Geographical Avoidance for Tor. | |
Esposito et al. | On data sovereignty in cloud-based computation offloading for smart cities applications | |
Abbas et al. | Masquerading attacks detection in mobile ad hoc networks | |
EP2885902B1 (en) | System and method for geothentication | |
Xu et al. | Comprehensive review on misbehavior detection for vehicular ad hoc networks | |
Grover et al. | Sybil attack detection in VANET using neighbouring vehicles | |
Grover et al. | Sybil attack in vanets | |
Zhang et al. | A robust and practical solution to ADS-B security against denial-of-service attacks | |
JP6556976B2 (en) | Geocentration based on network ranging | |
Abdou et al. | Location verification on the internet: Towards enforcing location-aware access policies over internet clients | |
Raponi et al. | Road traffic poisoning of navigation apps: Threats and countermeasures | |
Ni et al. | A mobile phone‐based physical‐social location proof system for mobile social network service |